-
libiberty (20160215-1ubuntu0.3) xenial-security; urgency=medium
* SECURITY UPDATE: stack Exhaustion in C++ demangling
- debian/patches/CVE-2018-9138.patch: limit recusion and add
--no-recruse-limit option to tools that support name demangling.
- debian/patches/CVE-2018-9138-2.patch: fix a failure in the libiberty
testsuite by increasing the recursion limit to 2048.
- CVE-2018-9138
- CVE-2018-12641
- CVE-2018-12697
- CVE-2018-12698
- CVE-2018-17794
- CVE-2018-17985
- CVE-2018-18484
- CVE-2018-18700
- CVE-2018-18701
* SECURITY UPDATE: excessive memory consumption
- debian/patches/CVE-2018-12934.patch: remove support for demangling
GCC 2.x era mangling schemes.
- CVE-2018-12934
- CVE-2018-18483
* SECURITY UPDATE: stack consumption and heap-based buffer over-read
- debian/patches/CVE-2019-907x.patch: reject negative lengths and add
recursion counter.
- CVE-2019-9070
- CVE-2019-9071
* SECURITY UPDATE: integer overflow and heap-based buffer overflow
- debian/patches/CVE-2019-14250.patch: check zero value shstrndx.
- CVE-2019-14250
-- Marc Deslauriers <email address hidden> Wed, 01 Apr 2020 11:39:51 -0400
-
libiberty (20160215-1ubuntu0.2) xenial-security; urgency=medium
* SECURITY UPDATE: integer overflow in string_appends
- debian/patches/CVE-2016-2226.patch: check for overflow in
libiberty/cplus-dem.c.
- CVE-2016-2226
* SECURITY UPDATE: use-after-free vulberabilities
- debian/patches/CVE-2016-4487_4488.patch: set bsize and ksize in
libiberty/cplus-dem.c, added test to
libiberty/testsuite/demangle-expected.
- CVE-2016-4487
- CVE-2016-4488
* SECURITY UPDATE: integer overflow in gnu_special
- debian/patches/CVE-2016-4489.patch: handle case where consume_count
returns -1 in libiberty/cplus-dem.c.
- CVE-2016-4489
* SECURITY UPDATE: integer overflow after sanity checks
- debian/patches/CVE-2016-4490.patch: parse numbers as integer instead
of long in libiberty/cp-demangle.c, added test to
libiberty/testsuite/demangle-expected.
- CVE-2016-4490
* SECURITY UPDATE: denial of service via infinite recursion
- debian/patches/CVE-2016-4491-1.patch: limit recursion in
include/demangle.h, libiberty/cp-demangle.c, libiberty/cp-demint.c,
added test to libiberty/testsuite/demangle-expected.
- debian/patches/CVE-2016-4491-2.patch: limit more recursion in
libiberty/cp-demangle.c.
- debian/patches/CVE-2016-4491-3.patch: initialize d_printing in
libiberty/cp-demangle.c.
- CVE-2016-4491
* SECURITY UPDATE: buffer overflow in do_type
- debian/patches/CVE-2016-4492_4493.patch: properly handle large values
and overflow in libiberty/cplus-dem.c, added test to
libiberty/testsuite/demangle-expected.
- CVE-2016-4492
- CVE-2016-4493
* SECURITY UPDATE: denial of service via infinite recursion
- debian/patches/CVE-2016-6131.patch: prevent infinite recursion in
libiberty/cplus-dem.c, added test to
libiberty/testsuite/demangle-expected.
- CVE-2016-6131
-- Marc Deslauriers <email address hidden> Mon, 12 Jun 2017 12:43:14 -0400
-
libiberty (20160215-1) unstable; urgency=medium
* Update to 20160215.
-- Matthias Klose <email address hidden> Mon, 15 Feb 2016 20:15:28 +0100
-
libiberty (20141014-1) unstable; urgency=medium
* Update to 20141014.
-- Matthias Klose <email address hidden> Tue, 14 Oct 2014 14:23:53 +0200